{"vulnerability": "CVE-2020-2951", "sightings": [{"uuid": "3654e5e2-dc30-4437-be62-66c58a361a2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29511", "type": "seen", "source": "https://t.me/cibsecurity/20768", "content": "\u203c CVE-2020-29511 \u203c\n\nThe encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T22:39:27.000000Z"}, {"uuid": "c5dd0875-89d4-4fad-a143-417d2f2e9c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29510", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2330", "content": "#Threat_Research\nCoordinated disclosure of XML round-trip vulnerabilities in Go\u2019s standard library (CVE-2020-29509, CVE-2020-29510, CVE-2020-29511)\nhttps://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities", "creation_timestamp": "2022-06-29T03:35:24.000000Z"}, {"uuid": "800c2011-bcfa-4b4a-9649-5e90852313af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-29511", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2330", "content": "#Threat_Research\nCoordinated disclosure of XML round-trip vulnerabilities in Go\u2019s standard library (CVE-2020-29509, CVE-2020-29510, CVE-2020-29511)\nhttps://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities", "creation_timestamp": "2022-06-29T03:35:24.000000Z"}]}